Detect
Respondents have adopted
Anomalies & events
Intrusion detection system 62%
Security event analysis 40%
Use SIEM technologies 26%
Security continuous monitoring
Regularly monitor, inspect, & compare outbound network traffic
against threat intelligence 52%
Regular system log monitoring to identify intrusion attempts 49%
Monitor Internet connections 42%
Vulnerability management 40%
Conduct regular security audits 36%
Cyber threat intelligence analysis 33%
Required internal reporting of misuse or abuse of computer access by
employees or contractors 32%
Employee monitoring 28%